The TLS-DSK authentication package uses an X.509 v3 certificate to authenticate an endpoint. If you want a deep-dive session that explains how Lync 2010 works, watch the Tech-Ed 2010 session, This article doesn’t delve into the technical details of TLS-DSK. This article explains which Lync features rely on TLS-DSK and what impact this TKL-DSK may have on enterprise PKI deployments.įor a detailed explanation of how security associations are established in SIP, and specifics on the TLS-DSK protocol, see the By default, all Lync clients and Lync telephony devices authenticate against Lync servers using the new authentication package, TLS-DSK. There are three authentication packages available to the Lync client when authenticating a registered endpoint in a Lync environment: NTLM, Kerberos, and TLS-DSK. : Microsoft Lync Server 2010, Microsoft Lync Server 2013 Preview ![]() : Nick Firsow, Microsoft Senior Service Engineer The presence of this certificate in the environment can affect the behavior of some common PKI implementations. This certificate is found in the user’s personal certificate store in their Windows profile. The certificate used for this authentication is a self-signed client authentication certificate issued to the client by Lync Server. This article explains which features in a Lync Server deployment rely on TLS-DSK and what impact TLS-DSK has NTLM, Kerberos, and TLS-DSK are the three available authentication packages for registered Lync endpoints. ![]() First published on TECHNET on Aug 20, 2012
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |